Design and Implementation of Conflict Detection System for Time-Based Firewall Policies

نویسندگان

  • Subana Thanasegaran
  • Yuichiro Tateiwa
  • Yoshiaki Katayama
  • Naohisa Takahashi
چکیده

Firewalls are one of the most common mechanisms used to protect the network from unauthorized access and security threats. Nowadays, time-based firewall policies are widely in use in many firewalls such as CISCO ACLs and Linux iptables to control network traffic with respect to time. However, network administrators struggle to maintain the firewall policies due to their high complexity. A conflict is a misconfiguration that occurs due to mismanagement of a firewall policy. Detection of conflicts and reconfiguration of the policies to discard conflicts is an extremely complicated task for any network administrator. Even though there are currently many conflict detection techniques, the prevailing techniques cannot deal with time-based firewall policies. As a result, when they are applied to time-based firewall policies, the time fields are ignored; therefore, the problem of obtaining false positive results arises, stating a non-conflict as a conflict. This problem has not been addressed in previous researches regardless of its significance. In this paper, we have formalized the conflict detection problem by designing a time-based firewall policy similar to the Linux iptables and CISCO ACLs. We have proposed a system to detect conflicts by extending the topology-based spatial analysis of firewall policies without time fields to time-based firewall policies, and we have presented the implementation of the proposed system in detail. Furthermore, we have evaluated the feasibility and usefulness of the proposed system by conducting experiments with various time-based firewall policies, and we have verified the effectiveness of the proposed system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus

Firewalls use packet filtering to either accept or deny packets on the basis of a set of predefined rules called filters. The firewall forms the initial layer of defense and protects the network from unauthorized access. However, maintaining firewall policies is always an error prone task, because the policies are highly complex. Conflict is a misconfiguration that occurs when a packet matches ...

متن کامل

Firewall Management for to Resolve the Policy Anomalies

Firewall is a security system for network, that controls the network traffic based on firewall rules. Firewall depends on the policy configuration, but managing that firewall policy is complex. Existing policy analysis tools, such as Firewall Policy Advisor and FIREMAN, they can only detect the policy anomaly cannot resolve these anomalies, and detection time was also increased. Therefore, I re...

متن کامل

Design and implementation of Persian spelling detection and correction system based on Semantic

Persian Language has a special feature (grapheme, homophone, and multi-shape clinging characters) in electronic devices. Furthermore, design and implementation of NLP tools for Persian are more challenging than other languages (e.g. English or German). Spelling tools are used widely for editing user texts like emails and text in editors.  Also developing Persian tools will provide Persian progr...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

A New Method for Intrusion Detection Using Genetic Algorithm and Neural network

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011